Improved RF Fingerprint-based Identity Verification in the Presence of an SEI Mimicking Adversary
DOI:
https://doi.org/10.13052/jcsm2245-1439.1354Keywords:
Specific emitter identification (SEI), ID verification, security, SEI mimicry, Adversary, RF fingerprintAbstract
Specific Emitter Identification (SEI) is advantageous for its ability to passively identify emitters by exploiting distinct, unique, and organic features unintentionally imparted upon every signal during formation and transmission. These features are attributed to the slight variations and imperfections in the Radio Frequency (RF) front end; thus, SEI is being proposed as a physical layer security technique. Most SEI work assumes the targeted emitter is a passive source with immutable and difficult-to-mimic signal features. However, Software-Defined Radio (SDR) proliferation and Deep Learning (DL) advancements require a reassessment of these assumptions because DL can learn SEI features directly from an emitter’s signals, and SDR enables signal manipulation. This paper investigates a strong adversary that uses SDR and DL to mimic an authorized emitter’s signal features to circumvent SEI-based identity verification. The investigation considers three SEI mimicry approaches, two different SDR platforms, the application of matched filtering before SEI feature extraction, and selecting the most informative portions of the signals’ time-frequency representation using entropy. The results show that “off-the-shelf” DL achieves effective SEI mimicry. Additionally, SDR constraints impact SEI mimicry effectiveness and suggest an adversary’s minimum requirements. Our results show matched filtering results in the identity of all authorized emitters being correctly verified at a rate of 90% or higher, the rejection of all other authorized emitters–whose IDs are not being verified–at a rate of 97% or higher, and rejection of forty-five out of forty-eight SEI mimicry attacks. Based on the results presented herein, future SEI research must consider adversaries capable of mimicking another emitter’s SEI features or manipulating their own.
Downloads
References
Martin Bastiaans and Marc Geilen. On the discrete gabor transform and the discrete zak transform. Signal processing, 49(3), 1996.
William E Cobb, Eric D Laspe, Rusty O Baldwin, Michael A Temple, and Yong C Kim. Intrinsic physical-layer authentication of integrated circuits. IEEE Transactions on Information Forensics and Security, 7(1):14–24, 2011.
Boris Danev, Heinrich Luecken, Srdjan Capkun, and Karim El Defrawy. Attacks on physical-layer identification. In Proceedings of the third ACM conference on Wireless network security, pages 89–98, 2010.
Ettus Research. USRP Hardware Driver and USRP Manual. https://www.ettus.com/all-products/ub210-kit/, May 26, 2020.
Mohamed KM Fadul, Donald R Reising, and Mina Sartipi. Identification of ofdm-based radios under rayleigh fading using rf-dna and deep learning. IEEE Access, 9:17100–17113, 2021.
Mohamed KM Fadul, Jordan T Willis, Donald R Reising, and T Daniel Loveless. An analysis of process parameters for the optimization of specific emitter identification under rayleigh fading. In Global IoT Summit, pages 277–291. Springer, 2022.
Steven Frank. This AI can Spot an Art Forgery: With millions at stake, deep learning enters the art world. IEE Spectrum, Aug 2021.
Dennis Gabor. Theory of communication. part 1: The analysis of information. Journal of the Institution of Electrical Engineers-part III: radio and communication engineering, 93(26):429–441, 1946.
Rafael C Gonzalez, Steven L Eddins, Richard Eugene Woods, et al. Digital image processing using MATLAB. Upper Saddle River, NJ: Pearson/Prentice Hall,, 2004.
Great Scott Gadgets. HackRF One. https:/greatscottgadgets.com/hackrf/one/, May 26, 2020.
Hao Han, Li Cui, Wen Li, Luying Huang, Yuan Cai, Jihao Cai, and Yuli Zhang. Radio frequency fingerprint based wireless transmitter identification against malicious attacker: An adversarial learning approach. In 2020 International Conference on Wireless Communications and Signal Processing (WCSP), pages 310–315. IEEE, 2020.
IEEE. IEEE Std 802.11-2007, Local and Metropolitan Area Networks, Part 11: Wireless LAN Medium Access Control (MAC) and Physical Layer (PHY) Specifications, Jun 2007.
Hossein Jafari, Oluwaseyi Omotere, Damilola Adesina, Hsiang-Huang Wu, and Lijun Qian. Iot devices fingerprinting using deep learning. In Military Communications Conference (MILCOM), pages 1–9. IEEE, 2018.
Samurdhi Karunaratne, Enes Krijestorac, and Danijela Cabric. Penetrating rf fingerprinting-based authentication with a generative adversarial attack. In International Conference on Communications (ICC), pages 1–6. IEEE, 2021.
Igor Kononenko. Estimating attributes: Analysis and extensions of relief. In European conference on machine learning, pages 171–182. Springer, 1994.
Lawrence E Langley. Specific emitter identification (sei) and classical parameter fusion technology. In Proceedings of WESCON’93, pages 377–381. IEEE, 1993.
Guyue Li, Jiabao Yu, Yuexiu Xing, and Aiqun Hu. Location-invariant physical layer identification approach for wifi devices. Ieee Access, 7:106974–106986, 2019.
Gihan Janith Mendis, Jin Wei-Kocsis, and Arjuna Madanayake. Deep learning based radio-signal identification with hardware design. IEEE Transactions on Aerospace and Electronic Systems, 55(5):2516–2531, 2019.
Yiwei Pan, Sihan Yang, Hua Peng, Tianyun Li, and Wenya Wang. Specific emitter identification based on deep residual networks. IEEE Access, 7:54425–54434, 2019.
Donald Reising, Joseph Cancelleri, T Daniel Loveless, Farah Kandah, and Anthony Skjellum. Radio identity verification-based iot security using rf-dna fingerprints and svm. IEEE Internet of Things Journal, 8(10):8356–8371, 2020.
Donald R Reising, Michael A Temple, and Julie A Jackson. Authorized and rogue device discrimination using dimensionally reduced rf-dna fingerprints. IEEE Transactions on Information Forensics and Security, 10(6):1180–1192, 2015.
Donald R Reising, Joshua H Tyler, Mohamed KM Fadul, Matthew R Hilling, and T Daniel Loveless. Rf fingerprint-based identity verification in the presence of an sei mimicking adversary. In 2023 19th International Conference on Wireless and Mobile Computing, Networking and Communications (WiMob), pages 438–444. IEEE, 2023.
Francesco Restuccia, Salvatore D’Oro, Amani Al-Shawabka, Mauro Belgiovine, Luca Angioloni, Stratis Ioannidis, Kaushik Chowdhury, and Tommaso Melodia. Deepradioid: Real-time channel-resilient optimization of deep learning-based radio fingerprinting algorithms. In Proceedings of the Twentieth ACM International Symposium on Mobile Ad Hoc Networking and Computing, pages 51–60, 2019.
Francesco Restuccia, Salvatore D’Oro, Amani Al-Shawabka, Bruno Costa Rendon, Kaushik Chowdhury, Stratis Ioannidis, and Tommaso Melodia. Hacking the waveform: Generalized wireless adversarial deep learning. arXiv preprint arXiv:2005.02270, 2020.
Kejin Sa, Dapeng Lang, Chenggang Wang, and Yu Bai. Specific emitter identification techniques for the internet of things. IEEE Access, 8:1644–1652, 2019.
Yi Shi, Kemal Davaslioglu, and Yalin E Sagduyu. Generative adversarial network in the air: Deep adversarial learning for wireless signal spoofing. IEEE Transactions on Cognitive Communications and Networking, 7(1):294–303, 2020.
Bernard Sklar. Digital communications: fundamentals and applications. Pearson, 2021.
Mohamed A Taha, Mohamed KM Fadul, Joshua H Tyler, Donald R Reising, and T Daniel Loveless. An assessment of entropy-based data reduction for sei within iot applications. In Military Communications Conference (MILCOM), pages 385–392. IEEE, 2022.
Joshua H Tyler, Mohamed KM Fadul, Donald R Reising, and Erkan Kaplanoglu. Simplified denoising for robust specific emitter identification of preamble-based waveforms. In 2021 IEEE Global Communications Conference (GLOBECOM), pages 1–7. IEEE, 2021.
Joshua H Tyler, Mohamed MK Fadul, Donald R Reising, and Farah I Kandah. An analysis of signal energy impacts and threats to deep learning based sei. In ICC 2022-IEEE International Conference on Communications, pages 2077–2083. IEEE, 2022.
WiSilica. Top 6 IoT Communication Protocols. https:/wisilica.com/company/top-6-iot-communication-protocols/, Aug. 2020.
Qiang Xu, Rong Zheng, Walid Saad, and Zhu Han. Device fingerprinting in wireless networks: Challenges and opportunities. IEEE Communications Surveys & Tutorials, 18(1):94–104, 2015.
Published
How to Cite
Issue
Section
License
Copyright (c) 2024 Journal of Cyber Security and Mobility
![Creative Commons License](http://i.creativecommons.org/l/by-nc/4.0/88x31.png)
This work is licensed under a Creative Commons Attribution-NonCommercial 4.0 International License.